Ethical Hacking and Penetration Testing Guide


Introduction to Metasploit



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə115/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   111   112   113   114   115   116   117   118   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

Introduction to Metasploit
We have used Metasploit in some previous demonstrations, where we worked with its auxiliary 
modules, but so far, we have not used it for exploiting the target and gaining access to the target. 
Metasploit is the Swiss army knife penetration testing and is something that you can use not only 
for network exploitation but for web exploitation too.
Metasploit is a free open-source software that could be used to automate lots of complex 
tasks. Since Metasploit is a huge framework, it won’t be possible for me to cover every aspect 
of it here, but I will try to cover the essentials and will do my best to get you get going with 
Metasploit.
History of Metasploit
Metasploit was initially started by HD More in 2003. He named it the “Metasploit Project.” 
Initially it was started as a public resource for exploit development; however, later it was turned 
into the “Metasploit Framework.” The first two versions of the Metasploit Framework were coded 
in Perl; later, it was shifted to Ruby. In 2009, it was purchased by a company named Rapid7, which 
allowed more frequent development for the “Metasploit Framework,” and as a result, lots of fea-
tures were introduced in it.
Metasploit Interfaces
There are several interfaces for Metasploit. It’s available in all forms, that is, interactive, command 
line, and GUI. Let’s take a look at some of its popular interfaces:
MSFConsole
MSFConsole is the most popular interface for the Metasploit Framework and it is what we will 
be using in most of our examples in this book. The reason it’s the best in my opinion is that the 
settings/options in msfconsole are all interactive.
In order to launch msfconsole, all we need to do is enter “msfconsole” command in the shell, 
and it will be launched.


Remote Exploitation
◾ 

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   111   112   113   114   115   116   117   118   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin